Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Python Machine Learning By Example [2017].azw3电子书下载 ... ad click-through prediction, stock prices forecast, will keep you glued till you reach your goal. What you will learn Exploit the power of Python to handle data extraction, manipulation, and exploration techniques Use Python to visualize data spread ...
  • Android NDK Beginner-'s Guide Book Description Android NDK is all about injecting high performance into your apps. Exploit the maximum power of these mobile devices using high-performance and portable code. This book will show you how to create C/C++ enabled applications and ...
  • Kali Linux Network Scanning Cookbook - Second Edition [2017] ... and tools Identify distinct vulnerabilities in both web applications and remote services and understand the techniques that are used to exploit them Perform comprehensive scans to identify listening on TCP and UDP sockets Get an overview of the different ...
  • Learning Apache Spark 2 ... Features Exclusive guide that covers how to get up and running with fast data processing using Apache Spark Explore and exploit various possibilities with Apache Spark using real-world use cases in this book Want to perform efficient data processing at ...
  • R for Everyone: Advanced Analytics and Graphics ... includes Explore R, RStudio, and R packages Use R for math: variable types, vectors, calling functions, and more Exploit data structures, including data.frames, matrices, and lists Read many different types of data Create attractive, intuitive statistical ...
  • Mastering Kali Linux for Advanced Penetration Testing - Second E... ... stealth to avoid detection in the network being tested Recognize when stealth attacks are being used against your network Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from ...
  • Effective Python Penetration Testing ... of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. ...
  • An Introduction to Machine Learning, 2nd Edition ... networks, and support vector machines. Later chapters show how to combine these simple tools by way of “boosting,” how to exploit them in more complicated domains, and how to deal with diverse advanced practical issues. One chapter is dedicated to the ...
  • Hacking and Securing iOS Application ... and penetration testers exactly how to break into the latest versions of Apple's iOS operating system, attack applications, and exploit vulnerabilities, so that they can write more secure applications with what they've learned. With the App Store reaching ...
  • KaLi Linux中文指南 ... Aircrack-ng (一应用于对无线局域网进行渗透测试的软件)用户可通过硬盘、live CD或live USB运行Kali Linux。Metasploit的Metasploit Framework支持Kali Linux,Metasploit一套针对远程主机进行开发和执行Exploit代码的工具。 Kali Linux既有32位和64位的映像。可用于x86 指令集。同时还有基于ARM架构的映像,可用于树莓派和三星的ARM Chromebook。